As the mobile threat landscape has expanded over the past decade, Apple's iOS releases have added new MDM features to help security professionals protect enterprise networks.
Governments must embrace an immune system approach centered on security intelligence to stay ahead of advanced cyberthreats looking to breach the ever-widening perimeter of smart cities.
As the workforce embraces mobility to increase productivity, organizations must adopt a more innovative, dynamic approach to mobile threat defense.
A decades-old mobile security flaw resurfaced in recent weeks after a U.S. senator reported that cybercriminals exploited the Signaling System 7 (SS7) protocol to breach a mobile carrier.
The key to improving identity theft awareness is to understand the risks, which include phishing attacks, digital trust abuse, poor password management, BYOD policies and more.
Emerging mobile and cloud-based technologies present many new challenges pertaining to sporting event cybersecurity.
The mobile revolution has made it simpler and faster for banking customers to conduct financial transactions, but it has also expanded the attack surface for fraudsters aiming to steal sensitive data.
Organizations in every industry, from banking to retail, healthcare and more, are required to apply mobile data protection rules set by governments that impose massive fines in cases of noncompliance. Until the early 2000s, it was simpler to control...
In recent years, the risks associated with passing through an airport have changed dramatically. This demands a complete rethink about mobile security best practices for international travel.
When a special char in an application running on a common operating system generates a memory corruption issue, a holistic security immune system is the key to minimizing the impact of a DoS event.