Please turn on your JavaScript for this page to function normally.
IT pros unsure of security risks when using remote support tools

Research from Bomgar and Ovum surveyed 300 IT decision-makers across the UK, France and Germany, focusing on the challenges faced by enterprise companies that provide remote …

Cyber threats organisations will deal with in 2014

The threat landscape is constantly evolving, and it’s an enterprise’s job and duty to keep up with the changes and do the best it can to protect its data, …

Secure corporate BYOD solution by ForeScout

ForeScout Technologies announced interoperability between ForeScout CounterACT network security and SAP Afaria mobile device management (MDM) platforms. The combination …

Characteristics of effective security leaders

A new IBM study of security leaders reveals that they are increasingly being called upon to address board-level security concerns and as a result are becoming a more strategic …

Traditional security models becoming exhausted

The Nexus of Forces is transforming the approach towards information security as new requirements are brought about by social, mobile, cloud and information. Gartner predicts …

Cyber attacks targeting the energy sector on the rise

Alert Logic examined the rise of cyber attacks targeting the energy sector—an industry thought to be particularly at risk due to the highly confidential and proprietary …

Young employees don’t care about corporate policies

There’s a growing appetite of Generation Y employees to contravene corporate policies governing use of own devices, personal cloud storage accounts and new technologies …

Mobile IDS/IPS solution for iOS devices

Skycure introduced its mobile IDS/IPS solution that protects iPhones and iPads by monitoring network traffic behavior and remediating suspicious activity. Existing solutions …

Webroot enhances mobile threat protection

Webroot released a new edition of Webroot SecureAnywhere Business – Mobile Protection to ensure mobile devices and company data stay secure. As more organizations face …

Unisys Stealth for Mobile solution protects against BYOD issues

Unisys announced the Unisys Stealth for Mobile solution to address the security concerns facing enterprises as growing numbers of their employees use consumer devices at work. …

How to establish trust in the cloud

Business is increasingly taking place outside the corporate firewall. Employees are using their own devices and turning to consumer-grade cloud file sharing services to allow …

BYOD vulnerability remediation from iScan Online

iScan Online announced a new user-friendly approach that will prioritize and simplify how users remediate their own devices. The new BYOD remediation feature categorizes …

Don't miss

Cybersecurity news