March 30, 2017 Wipeout? Subpar Secondhand Mobile Device Security Leaves PII Exposed 2 min read - Secondhand mobile device security is a struggle for many, according to new research. Data found that 40 percent of reused devices still contain old PII.
Data Protection February 21, 2017 Disposing of Your Device: Don’t Throw the Data Out With the Old PC 4 min read - Disposing of your device securely means wiping old data, deauthorizing account access and finding an ecologically sound home for the old device.
Application Security January 4, 2017 IoT Security: Who Is Stepping Up? 4 min read - Government agencies, customers and device manufacturers must develop better IoT security practices to protect the growing number of connected devices.
Cloud Security December 12, 2016 Secure Your IoT Deployment by Paying Attention to These Four Factors 3 min read - It has never been more important to secure your IoT deployment. Challenges include lack of visibility, inexperience and the IoT's increasing complexity.
November 28, 2016 Securing the Internet of Things: Best Practices From the DHS 2 min read - The Department of Homeland Security (DHS) recently issued a set of nonbinding principles for securing the internet of things (IoT).
Government June 21, 2016 FTC Studying Manufacturers’ Mobile Device Security Update Practices 3 min read - The FTC recently mandated that eight major mobile device manufacturers in the U.S. reveal their security update practices and general update policies.
Identity & Access March 25, 2016 Identity and Access Management: Deciphering a Fluid Puzzle 3 min read - The key to minimizing security vulnerabilities is the adoption of a layered cognitive approach to the wider identity and access management question.
Application Security February 25, 2016 Your Medical Device Is in My Internet of Things 3 min read - A medical device today is most likely connected to the Internet of Things, which makes security and vulnerability reporting of paramount importance.
May 7, 2015 Do No Harm? Medical Device Vulnerabilities Put Patients at Risk 2 min read - Hospitals now rely on medical device technology to improve care outcomes, but are security flaws in these devices putting patients at risk?
Endpoint February 6, 2015 Securing Devices, Data and Users: Unified Endpoint Management at IBM InterConnect 2015 2 min read - In the face of quickly evolving technology and increased cybercriminal threats, organizations need to consider using an endpoint management solution.