Artificial Intelligence June 7, 2019 Have Your Virtual Assistant Call My Bot and We’ll Do Lunch: A Step Toward the Cognitive Enterprise 4 min read - In the near future, we're going to see the role of office power broker shift from an administrative assistant to a virtual assistant. How does the CISO's role change in this cognitive enterprise?
Endpoint April 23, 2019 Mobile Security Risks Are on the Rise, But Employers Continue to Cut Corners 3 min read - While smartphones and tablets have become more ubiquitous in the workplace, organizations are flat out ignoring mobile security risks.
Data Protection February 26, 2019 When Combating Emerging Social Media Attacks, Don’t Try to Swim Against the Current 4 min read - The lure of social media is too much to fight against. Instead of pushing back, we need to work with what we've got and do our best to educate employees about potential social media attacks.
Endpoint January 24, 2019 As BYOD Adoption and Mobile Threats Increase, Can Enterprise Data Security Keep Up? 4 min read - While most security professionals have come to embrace bring-your-own-device (BYOD) policies, leadership still often lacks confidence in the data security of employees' personal devices.
Data Protection October 26, 2018 How to Secure Mobile Messaging in Your Enterprise 3 min read - Two decades ago, AOL's Instant Messenger changed the way we communicate. Today, mobile messaging is more popular than ever — but not much more secure.
Data Protection October 17, 2018 Is Employee Negligence Threatening Your Information Security? 3 min read - With a little education and a lot of communication, security leaders can steadily reduce employee negligence over time through consistent, comprehensive awareness training.
CISO September 5, 2018 Why You Shouldn’t Overlook Personal Electronic Devices in Your Enterprise Network 3 min read - When it comes to protecting personal electronic devices, a strong organizational culture of security, from top management to the most junior employees, is imperative.
June 5, 2018 Poor Identity Theft Awareness Leads to Common User Risks 2 min read - The key to improving identity theft awareness is to understand the risks, which include phishing attacks, digital trust abuse, poor password management, BYOD policies and more.
Endpoint November 9, 2017 Making the Case for Containment With WIP 3 min read - When integrated with a UEM solution by default, Windows Information Protection (WIP) acts as its own container and maintains a native user experience.
Endpoint June 26, 2017 Should We Disconnect to Improve IoT Security? 3 min read - There is no such thing as total IoT security, and the value businesses can gain from the technology outweighs the perceived benefit of disconnecting.