Frank Ohlhorst

IT Consultant

Frank is an award-winning technology journalist, professional speaker and IT business consultant with over 25 years of experience in the technology arena. He has written for several leading technology publications, including ComputerWorld, TechTarget, PCWorld, ExtremeTech, Tom's Hardware and business publications, including Entrepreneur, Forbes and BNET. Ohlhorst was also the Executive Technology Editor for Ziff Davis Enterprise's eWeek and formerly the director of the CRN Test Center.

Security Breaches, Human Error Could Fuel Security Product Sales

Perhaps the HAL 9000 computer of "2001: A Space Odyssey" fame said it best, “It can only be attributable to human error.” At least that is the sentiment one gets while reading IBM’s recent Security Services 2014 Cyber Security Intelligence Index report.

IT Consumerization Can Bring Profits to Solution Providers 1

Infinite Convergence released the results of its 2014 Enterprise Internal Messaging Trends study Sept. 3, which surveyed close to 400 CIOs, CTOs and IT directors and managers on their companies’ policies, preferences and concerns about how employees communicate and exchange sensitive information.

Evil Twin Hotspots: Opportunity for Solution Providers

Mobility projects and bring your own device (BYOD) initiatives are growing at exponential rates in most enterprises, creating a host of security concerns that are all but impossible to defend against. Nowhere is this more true than with the mobile knowledge worker, who has come to rely on hotspots in airports, coffee shops, hotels and public areas to keep in contact with the corporate network and its associated applications.

IoT Brings Plenty of Security Concerns, Opportunities

A recent study by networking giant Hewlett-Packard (HPQ) has revealed that some 70 percent of the most common Internet of Things (IoT) devices are plagued by security vulnerabilities, making those devices prime targets for hackers. With the expected massive growth of IoT devices, enterprise must take notice and implement pre-emptive security technologies to bring a modicum of protection to those devices.

Sponsored Introduction Continue on to (or wait seconds) ×