Portable encrypted Linux computing environment
SPYRUS announced a new version of Secure Pocket Drive that allows end users to build and distribute their own secure bootable Linux OS image. In addition to offering secure …
The next step in BYOD security
The explosion in development and adoption of smartphones and tablets for both personal and business use in the past two years is both a blessing and a curse to IT departments …
How to do BYOD the right way
The massive proliferation of mobile devices and the employees’ tendency to prefer using devices they chose themselves has created quite a conundrum and challenges for …
Cisco goes beyond BYOD
Employees are demanding not only to use their own devices at work, but also to have more flexibility in the way they work and when and where they work. The Cisco Connected …
BYOD security for cloud Wi-Fi access
AirTight Networks introduced device fingerprinting techniques in its SpectraGuard Enterprise WIPS and AirTight Cloud Services that provide BYOD security and detection, …
New solution and certification addresses the BYOD challenge
Aruba Networks introduced ClearPass, an access management system for the secure provisioning of mobile devices on any enterprise network. It’s designed to enable IT …
Security for IT consumerization
Lancope announced that its StealthWatch System extends network visibility to mobile devices for the security of bring-your-own-device (BYOD) environments. By analyzing mobile …
IT managers express concerns over tablet security
Cisco commissioned a survey 1500 IT managers and executives in the US, Canada, UK, France, Germany and Spain to assess attitudes, fears and hopes for tablets in the workplace. …
Tips to manage top IT trends
ISACA shared recommendations today for managing three of the trends widely cited to dominate the IT landscape in 2012: Big Data, the consumerisation of information technology …
8 out of 10 applications fail to meet security standards
Considered “low hanging fruit” because of their prevalence in software applications, XSS and SQL Injection are two of the most frequently exploited …
The most vulnerable smartphones
Bit9 highlighted the most vulnerable popular smartphones in use today. The devices on the list pose the most serious security and privacy risk to consumers and corporations. …
Insecure devices extend shopping risks
Shopping online for the holidays is up, with a 15 point increase in the percentage of Americans who say they will spend more time shopping online than in 2010. But according …