Kyle Johnson Technology Editor - TechTarget - SearchSecurity SearchSecurity A look at ID proofing: bootstrapping a digital ID using a mobile device and physical ID 17 Sep 2019 SearchEnterpriseDesktop What are the differences between Google Chromebook Enterprise and Chrome Enterprise? 11 Sep 2019 SearchEnterpriseDesktop Welcome to Microsoft Desktop Analytics, the Windows Analytics successor 03 Sep 2019 SearchEnterpriseDesktop Jamf acquires Digita Security for macOS endpoint protection 31 Jul 2019 SearchEnterpriseDesktop Windows 10 security baselines finally go GA 29 Jul 2019 SearchSecurity What's the difference between a password and a PIN? 24 Jul 2019 SearchMobileComputing iOS 13 and Android Q show mobile OSes handle security, privacy issues better than Windows used to 16 Jul 2019 SearchEnterpriseDesktop Google Safe Browsing can differ between desktop and mobile. Why? 08 Jul 2019 SearchVirtualDesktop Raspberry Pi 4: Now the ultimate cheap thin client? 24 Jun 2019 SearchSecurity Despite recent vulnerabilities, you shouldn’t stop using hardware security keys like Yubikey 20 Jun 2019 SearchVirtualDesktop An update on the Citrix Workspace Hub: Citrix is serious about their low-cost thin client 30 May 2019 SearchVirtualDesktop Client virtualization still has its fans and use cases: A look at Hysolate and Qubes OS 29 May 2019 SearchEnterpriseDesktop You can now see if Chrome extensions are safe with Duo’s free, new CRXcavator tool 20 May 2019 SearchSecurity We talk a lot about access and authentication, but what about revoking user access? 07 May 2019 SearchEnterpriseDesktop How Google manages Chrome extensions without manually white/blacklisting each one 22 Apr 2019 SearchCloudComputing Google Cloud Next 2019: End user computing news 10 Apr 2019 SearchMobileComputing A short review of the Samsung Galaxy S10 Plus 26 Mar 2019 SearchMobileComputing Citrix and VMware are all in on ‘workflow’ apps. So, what is a workflow app? 12 Mar 2019 SearchEnterpriseDesktop Why can’t other apps get real-time co-authoring right like Google Docs? 05 Mar 2019 SearchEnterpriseDesktop How does Microsoft’s digital workspace app compare to VMware and Citrix's? 26 Feb 2019 SearchMobileComputing What we learned about mobile security from real-world mobile threat defense customer data 25 Feb 2019 SearchMobileComputing Zimperium mobile threat data shows malware is a worry but still impacts few devices 18 Feb 2019 SearchMobileComputing VMware acquires AetherPal for mobile support via screen viewing/remote control 12 Feb 2019 SearchEnterpriseDesktop Run potentially sketchy apps in the Windows Sandbox 31 Jan 2019 SearchEnterpriseDesktop What is Microsoft Intelligent Security Graph? 16 Jan 2019 SearchMobileComputing How do you block sideloaded app installation on iOS or Android? 09 Jan 2019 SearchEnterpriseDesktop What we learned about the new Workspace ONE Intelligent Hub and the latest in Mobile Flows 17 Dec 2018 SearchMobileComputing Wandera mobile security data shows locked-down corporate policies help lessen risk 11 Dec 2018 SearchMobileComputing How bad are mobile security threats? Our look at the numbers starts with Google and Lookout 27 Nov 2018 SearchVirtualDesktop Citrix Workspace Hub: Labor of love; not a full-fledged thin client option 08 Oct 2018 SearchMobileComputing Intune Win32 app management & more EUC news from Microsoft Ignite 2018 25 Sep 2018 SearchEnterpriseDesktop What’s new with Workspace ONE Intelligence & Trust Network? 13 Sep 2018 SearchVirtualDesktop VMworld 2018 First impressions: EUC isn’t totally ignored 30 Aug 2018 SearchSecurity With Pwned Passwords API, annoying password policies can finally go away 15 Aug 2018 SearchMobileComputing IBM MaaS360 built a voice-based AI assistant into their email app 02 Aug 2018 SearchSecurity Yubikey is hot in the security space, so we tested the consumer experience 02 Jul 2018 SearchMobileComputing Hey Siri: How does Apple MDM keep you from accessing corporate data? 13 Jun 2018 SearchMobileComputing Are digital assistants ready for serious enterprise use yet? 17 May 2018 1 2