Jen A. Miller

Jen A. Miller is a freelance journalist from New Jersey who writes for the New York Times, Philadelphia Inquirer and Runner's World, among others.

Should you worry about the Internet of Hackable Things?

Should you worry about the Internet of Hackable Things?

From wearables to appliances to e-readers, there’s no shortage of possible security holes when almost every device is connected.

How to measure the success of enterprise mobile apps

How to measure the success of enterprise mobile apps

If you’re not testing the performance of the mobile apps your company is deploying, you may be driving your employees into the shadows.

The real cost of unused software will shock you

The real cost of unused software will shock you

A new study shows that, on average, each computer in every office around the world has about $259 of unnecessary, unwanted or unused software on it. That’s a lot of shelfware – and it’s costing companies big-time.

How secure are wearables, anyway?

How secure are wearables, anyway?

Whether you're using that new wearable for yourself or managing IT at a company where fit trackers and smart watches are becoming more popular, wearables just might be the next big bullseye for cybercriminals.

Where do mobile apps fit in the world of enterprise software?

Where do mobile apps fit in the world of enterprise software?

While a recent study turns the idea of a ‘blockbuster’ app on its head, there’s no doubt that enterprise companies are embracing apps – especially mobility apps – in a big way.

How fake users are impacting business … and your wallet

How fake users are impacting business … and your wallet

Those fraudulent charges most of us have (hopefully) seen and corrected on our credit or debit cards are costing everyone a lot of money.

The year in fraud: 2015 in 13 numbers

The year in fraud: 2015 in 13 numbers

It's that time of year: Round ups, hot takes and eulogies for the year abound. We're no different, but we're going to tell the story of 2015 a little differently -- though numbers. Ten of them to be exact. In no particular order,...

Welcome to the Internet of stupid (hackable) things

Welcome to the Internet of stupid (hackable) things

The rise of IoT technology brings with it the promise of innovation the likes of which we’ve never seen. But the reality of everything being connected can have unintended consequences, not all of them useful.

How to recognize an online fraudster

How to recognize an online fraudster

The capability to profile potential cybercriminals, along with the implementation of chip-and-pin credit cards, may produce a reduction in the amount of money lost to online fraud each year. But that doesn’t mean the threat will go...

Malvertising – the new silent killer?

Malvertising – the new silent killer?

Malicious ads on the websites you visit aren’t a new phenomenon. The fact that they now avoid detection and don’t need you to click on ‘em to infect your computer is new, and increasingly troublesome.

Mobile device management has become alphabet soup

Mobile device management has become alphabet soup

The BYOD movement, once looked on as the holy grail of employee satisfaction and IT mobile device security, is increasingly being supplanted by a number of options – such as COBO, CYOD, COPE – that draw a thicker line between personal...

Is a lack of enterprise apps killing BYOD?

Is a lack of enterprise apps killing BYOD?

Bring-your-own-device policies in the workplace often pit employee satisfaction and privacy against corporate security. And as the number of employees and companies participating in BYOD programs continues to fall, can enterprise apps...

4 new cybercrime trends threaten your business

4 new cybercrime trends threaten your business

A mid-year report shows that people aren’t necessarily getting smarter about security, even in the face of increased attacks from cybercriminals.

BYOD – the tech revolution that wasn’t

BYOD – the tech revolution that wasn’t

Once upon a time, BYOD and the consumerization of IT was held up as a paragon of productivity and cost savings for enterprises that embraced the concept. Now? Not so much… What happened?

How the tech industry is greening its data centers

How the tech industry is greening its data centers

The desire to be masters of their own energy domains has helped fast-track a growing community of self-generating – and increasingly green – data center power consumers.

Predicting winners and losers in the EMV rollout

Predicting winners and losers in the EMV rollout

On October 1, the liability for credit card fraud shifts from card issuers to the retailers that haven’t transitioned to accept cards that use the new EMV technology. Some groups will be more ready than others.

Summer travel scam targets your points and miles

Summer travel scam targets your points and miles

How sure are you that the airline miles and hotel rewards points you’ve been hoarding for years will be there when you go to redeem them?

How to deploy tablets to your mobile workforce

How to deploy tablets to your mobile workforce

Wakefield Canada needed a new tablet PC for use in the field. Who better to ask then the very folks who’d have to use the mobile devices? Here’s what they chose and why.

Health insurance companies prime targets for hackers

Health insurance companies prime targets for hackers

Anthem’s recent data breach underscores the need for stronger security and highlights the potential harm that hackers can cause.

Is EMV the silver bullet to credit card fraud?

Is EMV the silver bullet to credit card fraud?

Your holiday shopping experience will be different next year, because by October 2015 most retailers in the U.S. will have switched to accepting the chip-in-a-credit-card-based EMV standard (which stands for Europay, MasterCard and...

Load More