IBM developed a new AI-enabled voice assistant to respond to common questions across email, corporate contacts and calendar using natural language processing (NLP) capabilities.
In addition to protecting laptops, smartphones, tablets and IoT devices, AI-powered UEM solutions can help security leaders manage apps, content, data and user identity and access more efficiently.
The mobile revolution has made it simpler and faster for banking customers to conduct financial transactions, but it has also expanded the attack surface for fraudsters aiming to steal sensitive data.
Organizations in every industry, from banking to retail, healthcare and more, are required to apply mobile data protection rules set by governments that impose massive fines in cases of noncompliance. Until the early 2000s, it was simpler to control...
In recent years, the risks associated with passing through an airport have changed dramatically. This demands a complete rethink about mobile security best practices for international travel.
When a special char in an application running on a common operating system generates a memory corruption issue, a holistic security immune system is the key to minimizing the impact of a DoS event.
Recent research has shown that companies are sacrificing mobile security for expediency and business performance.
Cisco's "2018 Annual Cybersecurity Report" found that burst attacks, cryptoworms and mobile threats are among security professionals' top concerns in 2018.
A group of researchers discovered a flaw in the protocol used in telecommunications networks that could enable fraudsters to pursue at least 10 different types of 4G LTE attacks.
Mobile threat prevention enables organizations to proactively protect their devices, users, apps and data from malicious actors.