Please turn on your JavaScript for this page to function normally.
The need for end-user visibility in a Bring Your Own Anything environment

Mobiles, tablets, PCs, applications, cloud services – employees are increasingly bringing non-company devices into their organizations and connecting them to everything …

Mobile apps are not being tested for insecure behavior

Enterprises are not doing nearly enough to understand which mobile app behaviors hitting their networks and data are risky, nor are they testing apps for those risky behaviors …

Mobile app developers are not investing in security

Nearly 40 percent of large companies, including many in the Fortune 500, aren’t taking the right precautions to secure the mobile apps they build for customers. A new …

2,400 unsafe mobile apps found in average large enterprise

The average global enterprise has approximately 2,400 unsafe applications installed in its mobile environment, according to Veracode. Based on an analysis of hundreds of …

Smartwatches and corporate data

I was super excited when my wife got me a smartwatch. In addition to the geeky coolness factor of a smartwatch, being a long-time security professional I was also interested …

The shift to secure apps in the enterprise

As enterprises are mobilizing content and apps, they are also fortifying their cyber resiliency with accelerated activations of secure mobile apps, which grew 65 percent …

Mobile security market to reach $34.8 billion by 2020

BYOD is adopted by most SMBs and large organizations, a major reason for the adoption of mobile security software. Smartphones are majorly adopted in Asia Pacific region and …

BYOD: Better stay used to it

BYOD is a common trend in organizations today. Businesses may be thrilled they don’t have to pay for tablets or smartphones for their workforce and don’t usually …

79% of professionals do business on personal devices

As employees increasingly demand a more mobile and social workplace, the pressure is on for enterprises to deliver the same technology experience employees have in their …

The problem with security shortcuts

A combination of irresponsible user behavior and weaknesses in the protection of networks could create more risks for data breaches during the holiday period than at any other …

What will create cybersecurity challenges in 2015?

Security experts at Unisys predicted even greater cybersecurity challenges in the year ahead as continued growth in the use of mobile devices and applications in the …

Cost savings drive businesses to the cloud

A survey of C-Level senior executives, developers and other industry delegates has found that 72% of respondents identified cost as the key benefit of using the cloud for the …

Don't miss

Cybersecurity news