Endpoint June 21, 2017 More Mobile Apps Means More Man-in-the-Middle Attacks 2 min read - Mobile devices that contain unsanctioned apps are particularly vulnerable to man-in-the-middle attacks, especially when connected to unsecured Wi-Fi.
Endpoint April 17, 2017 The IoT Is BYOD All Over Again 3 min read - Like the rise of BYOD culture in the enterprise, the explosion of IoT devices generates a new set of challenges for security professionals.
Endpoint March 23, 2017 The Retail Industry and the Challenges of Enterprise Mobility Management 2 min read - MaaS360 provides IT managers in the retail industry with all the enterprise mobility management tools they need to control remote access to corporate data.
Data Protection March 13, 2017 The Enterprise Mobility Conundrum: How to Control the Data? 3 min read - Businesses can benefit from BYOD policies, but IT leaders must implement the right enterprise mobility solutions to protect their sensitive data.
Artificial Intelligence February 22, 2017 The Disconnected Digital World 4 min read - As we continue our transformation into a digital world, IT leaders must find ways to resolve disconnects related to communication, policy, tools and more.
Endpoint January 13, 2017 How to Ensure the Success of a Hot Desking Strategy 2 min read - A hot desking strategy allows employees to sit wherever they want, creating more flexibility for workers and more complexity for IT managers.
Endpoint January 9, 2017 Bearing Fruit: The Future of Mobile Technology as Apple’s iPhone Turns 10 4 min read - Mobile technology buffs and analysts are hoping Apple will revolutionize the smartphone market once again 10 years after it released the first iPhone.
Endpoint December 29, 2016 BYOD Risks: Should Account Lockout Be Used After Failed Logins? 2 min read - For companies with a bring-your-own-device policy, IT managers should create security requirements that address BYOD risks without denting productivity.
Endpoint December 21, 2016 The BYOD Policy Holiday Challenge 2 min read - Many employees are sure to return to work after the holiday with brand new mobile devices, creating a variety of BYOD policy challenges for IT managers.
December 5, 2016 Wake-Up Call: Millions of Android Users at Risk of MitM Attacks 2 min read - Security researchers at Zimperium zLabs found a vulnerability in the AirDroid app that could enable a cybercriminals to execute MitM attacks.