Endpoint March 17, 2015 Android for Work Rewraps Lollipop for Business Security 3 min read - Android for Work is offering a sweeter choice than the sour taste of fragmentation when it comes to business security and device management.
Endpoint March 17, 2015 Is BYOD Starting to Spell Out ‘S-N-A-F-U’ in Enterprise Security? 4 min read - The bring-your-own-device (BYOD) trend is here to stay. Here is how organizations can educate employees and implement top security policies.
Identity & Access March 13, 2015 Three Reasons Social Engineering Still Threatens Companies 3 min read - Social engineering harms companies by tricking employees into surrendering sensitive information. Here are three reasons why it's still a threat.
Intelligence & Analytics March 5, 2015 Internet of Things: Can We Find a Balance Between Security and Convenience? 4 min read - If manufacturers build security into their IoT devices, hopefully we can all enjoy the benefits of IoT without being spied on by hacker Big Brothers.
March 5, 2015 Cyber Resiliency: Are Mobile Apps the New Fallback? 3 min read - As organizations work to boost their cyber resiliency to recover from attacks, mobile apps may be the newest security measure that can protect them.
Endpoint March 2, 2015 How to Permanently Secure Mobile Temp Workers 3 min read - Organizations need to keep mobile security in mind when letting temp workers take advantage of company-wide bring-your-own-device policies.
Software Vulnerabilities February 11, 2015 A Perfect Match: Uniting Mobile Security With Your Employees’ Use of Online Dating Apps 5 min read - A new IBM report details potential vulnerabilities in many popular dating apps that could negatively affect your organization's mobile security.
CISO December 17, 2014 Security Technology a Top Focus for CISOs 2 min read - Security leaders are focusing their attention on improving security technology in the face of innovations in the cloud, mobile devices and big data.
Intelligence & Analytics December 2, 2014 High-Priority Security Principles: Focus on Employees 3 min read - An organization's employees need to be taught proper security principles in order to play their role in keeping the enterprise safe from threats.
November 21, 2014 NotCompatible Mobile Malware Takes Aim at Android Devices 2 min read - Researchers say a botnet-for-rent known as NotCompatible has been improved and is becoming one of the worst mobile malware threats to target Android.