Security researchers revealed that two mobile malware threats, Xloader and FakeSpy, may have been developed and launched by the same cybercriminal group.
5G communications networks will empower a future that some are calling the "Fourth Industrial Revolution" — but security leaders must prepare for the coming 5G security threats.
The Forrester Wave: Unified Endpoint Management, Q4 2018 — New Acronyms, New Leaders and How Device Management Has Evolved
IBM was named a leader in the "2018 Forrester Wave: Unified Endpoint Management, Q4 2018" report, and MaaS360 earned recognition as the best current offering in the marketplace.
With modern mobile security challenges demanding a deeper level of visibility, policy and protection, organizations must invest in advanced unified endpoint management (UEM) solutions.
A group of researchers from Princeton revealed that, through an attack dubbed MadIoT, threat actors could leverage an IoT botnet to compromise the power grid and cause widespread blackouts.
Many organizations are paying much more than they realize for endpoint management in terms of money, resources and speed. Where do these hidden costs come from, and how can companies reduce them?
The TimpDoor malware family enables cybercriminals to turn infected Android devices into network proxies without users' knowledge.
By embracing the dervied credentials approach to personal identity verification, companies can deliver strong authentication, scalability, adherence to NIST guidelines, and ease of use and deployment.
Two decades ago, AOL's Instant Messenger changed the way we communicate. Today, mobile messaging is more popular than ever — but not much more secure.
Increasingly, businesses are focusing more on ruggedized and IoT device management, compliance of their endpoints, and developing an overall strategy to secure these types of devices.