Intelligence & Analytics November 9, 2015 Clear the Fog From Your Cloud Security Strategy < 1 min read - With data and applications now living outside an enterprise's firewalls, implementing a strong cloud security strategy has become incredibly important.
Endpoint October 21, 2015 Go Back to the Future, Today! How Well Did Doc and Marty Predict Today’s Tech? 4 min read - Oct. 21, 2015, is "Back to the Future" day. Let's look at how the movie's futuristic technology stacks up to what we really have today.
Endpoint October 16, 2015 Six Android Marshmallow Features to Embrace in Your Enterprise 3 min read - Android Marshmallow is out now and quickly proliferating in enterprises. Make sure your organization is secured with the right EMM solution.
Cloud Security October 6, 2015 AT&T and IBM Mobile Cloud Security Set to Scale Work Anywhere 2 min read - IBM is set to join the stage at this year's 17th Annual AT&T Cybersecurity Conference to announce the AT&T and IBM mobile cloud security solution.
Endpoint October 2, 2015 Ask Google: Eight Ways Android for Work Makes Lollipop Sweeter and Marshmallow ‘S’more’ Productive 5 min read - Android for Work Product Management Director Andrew Toy discusses how the management platform can enhance mobile security for an enterprise.
Endpoint September 29, 2015 Scoring Points With Mobility Management and Fantasy Football 3 min read - Fantasy football is a huge market that draws millions of users each year, and many of those players play games on their mobile devices during work hours.
CISO September 23, 2015 Travel Security: What to Know Before You Head to High-Risk Locales 4 min read - Implementing a travel security program within an enterprise involves learning how to communicate certain risks to employees on the move.
Data Protection September 17, 2015 Embrace Green Energy Initiatives — With an Eye Toward Security 3 min read - More companies are implementing green energy initiatives, but this often leads to specific security and privacy concerns that must be addressed.
Data Protection September 15, 2015 Should Enterprises Look to Universities When It Comes to Information Protection? 4 min read - Organizations can learn a lot from academic universities with regard to information protection, cybersecurity and information sharing.
Endpoint September 10, 2015 Six-Digit Passcodes: Two Small Steps for Smartphones, One Giant Leap for Mobile Security 3 min read - Apple now requires six-digit passcodes (instead of four) on its devices — meaning two small steps for users, but one giant leap for mobile security.