mobile devices
![Fire](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09195511/fire-match-400x200.jpg)
Total data protection outside the firewall
Gartner called Cloud Access Security Brokers (CASBs) the number one technology for information security in 2014. In fact, by 2016, 25% of enterprises will secure access to …
IoT and the great data heist
The term mobile has evolved from the device that simply made and received phone calls, to smartphones, wearables and a multitude of devices in the home. With the introduction …
The risks of moving data into cloud and mobile environments
In this podcast recorded at RSA Conference 2015, Rich Campagna, VP, Products & Marketing at Bitglass, talks about how cloud and mobile and the the largest trends …
Yahoo develops cheap, effective biometric smartphone authentication
A group of Yahoo researchers have demonstrated that apart from fingerprints, other parts of the human body, such as ears, fists, palms and fingers, can also be successfully …
![escalator](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09195000/escalator-400x200.jpg)
Simplified VPN, web access for authorized users via push notification
Entrust Datacard announced at RSA Conference 2015 the introduction of a new push authentication capability in its Entrust IdentityGuard Mobile platform that allows authorized …
Mobile malware is like Ebola – an overhyped threat
“Today, at RSA Conference 2015 in San Francisco, Damballa unveiled research which details the overblown nature of the mobile malware problem. Damballa monitos nearly 50% …
![Apple Watch](https://img.helpnetsecurity.com/wp-content/uploads/2015/04/09194705/apple_watch-400x200.jpg)
Apple Watch app for managing threat intelligence on-the-go
ThreatStream today announced at RSA Conference 2015 the first iOS threat intelligence app for the Apple Watch. The app, which is also available for the iPhone and iPad, …
Key trends for risk-prone behavior in the workforce
Businesses are ill prepared for the high-risk, high-growth mindset of the GenMobile workforce, creating alarming disparity around security practices in the corporate world. …
The need for end-user visibility in a Bring Your Own Anything environment
Mobiles, tablets, PCs, applications, cloud services – employees are increasingly bringing non-company devices into their organizations and connecting them to everything …
Snapchat blocks third-party apps from accessing its APIs
Snapchat has had its fair share of data breaches and security troubles, the latest of which stemmed from the fact that the app’s internal API has been reverse-engineered …
Behavioral biometrics: The password you can’t forget
This year’s Mobile World Congress featured more biometrics technology than ever before, with the launch of Google’s Android Pay and Samsung Pay both unveiling …
Mobile apps are not being tested for insecure behavior
Enterprises are not doing nearly enough to understand which mobile app behaviors hitting their networks and data are risky, nor are they testing apps for those risky behaviors …
Featured news
Sponsored
Don't miss
- Void Banshee APT exploited “lingering Windows relic” in zero-day attacks
- SYS01 info-stealer pushed via Facebook ads, LinkedIn and YouTube posts
- ChatGPTriage: How can CISOs see and control employees’ AI use?
- Managing exam pressure: Tips for certification preparation
- Firmware update hides Bluetooth fingerprints