Please turn on your JavaScript for this page to function normally.
Unmanaged Apple devices are a liability for corporations

While people widely use Apple devices for work, lack of security and management of those devices exposes companies to significant liabilities, according to a new survey by …

Risky mobile behaviors are prevalent in the government

Mobile devices are extremely prevalent in federal agencies, even within those that purport to have policies prohibiting the use of them. Lookout analyzed 20 federal agencies …

Getting BYOD right

According to a survey conducted by Kaspersky Lab in conjunction with B2B International, around half of the consumers surveyed also use their devices for work. However, only …

The state of the mobile ecosystem

At Black Hat USA 2015, Appthority released their second Q2 2015 Enterprise Mobile Threat Report, for which their researchers analyzed security and risky behaviors in three …

Employees embrace BYOD, but still worry about privacy

The findings of a new survey from Tyntec, based on responses from Spain, the UK and US, reveal sluggish adoption of BYOD policies by organizations, while its employees voice …

Organizations lack control over mobile workspaces

More than 64 percent of respondents to a SANS survey said a majority of their mobile workforce can access their organizations’ secure data remotely, yet less than 25 percent …

Fire
Total data protection outside the firewall

Gartner called Cloud Access Security Brokers (CASBs) the number one technology for information security in 2014. In fact, by 2016, 25% of enterprises will secure access to …

The risks of moving data into cloud and mobile environments

In this podcast recorded at RSA Conference 2015, Rich Campagna, VP, Products & Marketing at Bitglass, talks about how cloud and mobile and the the largest trends …

The ticking cybersecurity risk: Managing wearable tech in the workplace

Smartphones and tablets took time to effectively crossover from consumer device to business staple. Wearables, despite still being the infants of IT hardware, are already …

business
Identity, data governance across all apps, systems, and devices

At RSA Conference 2015, Deep Identity announced their expansion into London, UK, and the release of version 5 of their Identity and Data Governance Suite. Key features of the …

Five misunderstandings about cloud storage

Cloud storage is a solution that users are driving IT organizations to use whether we want to or not. Just ask a sales person what they use. They will tell you how great it is …

Internet of Everything attack surface grows

The proliferation of more than 16 billion connected computing devices today has significantly expanded the attack surface of our interconnected world. Unauthorized, BYOD, …

Don't miss

Cybersecurity news