Secondhand mobile device security is a struggle for many, according to new research. Data found that 40 percent of reused devices still contain old PII.
Disposing of your device securely means wiping old data, deauthorizing account access and finding an ecologically sound home for the old device.
Government agencies, customers and device manufacturers must develop better IoT security practices to protect the growing number of connected devices.
It has never been more important to secure your IoT deployment. Challenges include lack of visibility, inexperience and the IoT's increasing complexity.
The Department of Homeland Security (DHS) recently issued a set of nonbinding principles for securing the internet of things (IoT).
The FTC recently mandated that eight major mobile device manufacturers in the U.S. reveal their security update practices and general update policies.
The key to minimizing security vulnerabilities is the adoption of a layered cognitive approach to the wider identity and access management question.
A medical device today is most likely connected to the Internet of Things, which makes security and vulnerability reporting of paramount importance.
Hospitals now rely on medical device technology to improve care outcomes, but are security flaws in these devices putting patients at risk?
In the face of quickly evolving technology and increased cybercriminal threats, organizations need to consider using an endpoint management solution.