Sophos Cloud manages Windows, Mac and mobile devices
At Infosecurity Europe 2014, Sophos announced the latest version of Sophos Cloud, the company’s cloud-based solution for small- and mid-sized organisations seeking a …
Major gaps found in the governance of emerging technologies
SailPoint published an infographic which outlines recent research results that indicate that while global enterprises are embracing – and in some instances mandating …
96 percent of apps have security vulnerabilities
Improvements in patch deployment and secure coding practices have made a slight impact on the incidence of vulnerabilities, according to a new Cenzic report. However, the …
Mobility is the weakest security link
Surveying more than 750 security decision makers and practitioners, a CyberEdge Group report found that more than 60 percent had been breached in 2013 with a quarter of all …
Most non-IT employees don’t “get” company IT security policies
DataMotion released results of its second annual survey on corporate email and file transfer habits. Among the findings is a far-reaching communications disconnect between IT …
Microsoft releases BYOD best practices for enterprise workers
Microsoft is releasing best practices for enterprise workers who are considering using their personal technology device for work and play. This business trend, known as BYOD, …
Companies embrace the cloud and BYOD, can’t control them
Cloud applications and mobile devices are increasing security and compliance risk at many US and UK enterprises. Alarmingly, the SailPoint survey reveals that while global …
CIOs lack the vision when it comes to mobility
Mobile Helix announced the findings of an independent CIO survey of 300 IT decision makers in the UK and US; exploring how enterprises are making use of mobile technology. The …
Experts offer cyber security forecast for the year ahead
Kroll released its third annual Cyber Security Forecast, a prediction of the most significant cyber issues organizations will confront in 2014. The latest forecast highlights …
Top six security threats for 2014
The Information Security Forum (ISF) has announced their forecast of the top six security threats global businesses will face in 2014. Key threats include BYOD trends in the …
BYOD is an applications strategy, not just a purchasing policy
Bring your own device (BYOD) is not just a purchasing policy and needs to be approached more broadly with the applications and strategies designed for today’s world, …
Are tablets secure enough for business?
Amazon is launching its first enterprise-ready tablet. A smart move, as the much-loved mobile device can finally be integrated into business. However it does beg the question, …
Featured news
Resources
Don't miss
- CISA: Use Signal or other secure communications app
- Another NetWalker affiliate sentenced to 20 years in prison
- Why cybersecurity is critical to energy modernization
- Cryptocurrency hackers stole $2.2 billion from platforms in 2024
- CISA orders federal agencies to secure their Microsoft cloud environments