A group of researchers from Princeton revealed that, through an attack dubbed MadIoT, threat actors could leverage an IoT botnet to compromise the power grid and cause widespread blackouts.
Many organizations are paying much more than they realize for endpoint management in terms of money, resources and speed. Where do these hidden costs come from, and how can companies reduce them?
The TimpDoor malware family enables cybercriminals to turn infected Android devices into network proxies without users' knowledge.
By embracing the dervied credentials approach to personal identity verification, companies can deliver strong authentication, scalability, adherence to NIST guidelines, and ease of use and deployment.
Two decades ago, AOL's Instant Messenger changed the way we communicate. Today, mobile messaging is more popular than ever — but not much more secure.
Increasingly, businesses are focusing more on ruggedized and IoT device management, compliance of their endpoints, and developing an overall strategy to secure these types of devices.
With a little education and a lot of communication, security leaders can steadily reduce employee negligence over time through consistent, comprehensive awareness training.
With our mobile cybersecurity simulation facility, we can bring the Cyber Range experience to a global audience, helping companies develop the mastery and skills needed for cyberattack preparedness.
Bringing It All Back Home: Why You Should Apply Enterprise Network Security Policies to Your Smart Home
As threat actors increasingly target IoT devices to spread malware and facilitate DDoS attacks, it's crucial to establish network security policies for your home IT just as you would at work.
With many organizations now dependent on iOS devices, security leaders must balance productivity and security with the right endpoint management solution.