I know that open Wi-Fi is sometimes better than no Wi-Fi, which is why I always use a VPN when connecting to public networks. But not all business travelers are so careful, according to a new report.
According to Forrester, unified enpoint management enables customers to initiate a low-touch, no-touch process that reduces the time and effort needed to configure endpoints by as much as 96 percent.
The rollout of 5G technology could forever change how we manage mobile security, posing an entirely new set of risks we have not handled before.
While smartphones and tablets have become more ubiquitous in the workplace, organizations are flat out ignoring mobile security risks.
Smartphones running Android 7.0 and higher can now serve as two-factor authentication (2FA) tools as part of a Google 2FA strategy to boost security across its online services.
We can probably all agree that securing the devices on our networks is a fair definition of endpoint security. But within this traditional definition, what, really, is the endpoint of today?
Mobile malware is nothing new. But in recent months, attackers have been getting more creative and resourceful with how they conceal, distribute and deploy these threats.
Researchers detected a new Android Trojan called Gustuff that is capable of targeting more than 100 mobile banking apps.
Today's security leaders are tasked with complying with data privacy laws and enhancing user productivity while preserving their agility and securing them from mobile application security threats.
A new threat known as WinPot malware is using a slot machine-like interface to empty ATMs at targeted financial institutions.