Jen A. Miller

Jen A. Miller is a freelance journalist from New Jersey who writes for the New York Times, Philadelphia Inquirer and Runner's World, among others.

How to conquer a CRM monster

Government ill-equipped to thwart cyberwarfare

Government ill-equipped to thwart cyberwarfare

The U.S. infrastructure is outdated and vulnerable to cyberattacks. If government reaction doesn’t improve the country electrical could be crippled.

RNC attendees expose identity in free Wi-Fi trap

RNC attendees expose identity in free Wi-Fi trap

If it seems too good to be true, it probably is. Free Wi-Fi is no exception to this adage. Security company Avast tested this theory by setting up a number of free fake Wi-Fi hotspots to see how many people would take the bait. They...

Rio’s airport preps for Olympics with new Wi-Fi network and mobile app

With the 2016 Olympic Games promising to bring millions of visitors to Rio de Janeiro’s Galeão International Airport, its CIO initiated a huge wireless network upgrade and a new mobile app.

What are hackers up to these days?

What are hackers up to these days?

The short answer: They’re targeting sites in North America, where they’re planting malware in ad networks and launching dating site spam.

Can UC keep remote workers engaged?

Can UC keep remote workers engaged?

For something that seems so simple in theory, unified communications can be hard to pull off in practice. But it might be the only thing helping to keep your distributed workforce engaged.

4 tech nightmares keeping IT leaders up at night

4 tech nightmares keeping IT leaders up at night

What’s keeping CIOs awake at night? From data breaches to social engineering, there’s plenty to keep tech types tossing and turning.

Are IT executives blind to cybersecurity threats?

Are IT executives blind to cybersecurity threats?

If IT leaders and IT workers can’t agree that there’s a problem, what are the chances that they’ll actually implement the cybersecurity policy they need?

Has telecommuting finally become mainstream?

As the desire for workplace flexibility continues to be an accepted fact of contemporary working life, more and more businesses are wrestling with how exactly to embrace – or curtail – telecommuting as the new normal.

People are (still) the biggest security risks

Social engineering and ‘download this attachment’ scams are back – as if they ever left – and working better than ever, unfortunately.

How to avoid common travel and vacation scams

How to avoid common travel and vacation scams

From social engineering before you even get on the plane to apps that are riddled with security holes, it’s never been easier for cybercriminals to target unsuspecting travelers.

How long does it take to build a custom app?

How long does it take to build a custom app?

Thanks to advances in app-building technology and a changing mindset, the answer may surprise you.

Load More