Please turn on your JavaScript for this page to function normally.
South Korean minors to be monitored via smartphone spying apps

The Korea Communications Commission, South Korea’s media regulation agency modeled after US’ FCC, has made it mandatory for telecoms and parents to install a …

Secure smart devices for the holiday season

Summer is almost here and many are currently considering taking their beloved smart devices with them on their travels. However, the risks of doing so are sizeable.With a …

Organizations lack control over mobile workspaces

More than 64 percent of respondents to a SANS survey said a majority of their mobile workforce can access their organizations’ secure data remotely, yet less than 25 percent …

Fire
Total data protection outside the firewall

Gartner called Cloud Access Security Brokers (CASBs) the number one technology for information security in 2014. In fact, by 2016, 25% of enterprises will secure access to …

IoT and the great data heist

The term mobile has evolved from the device that simply made and received phone calls, to smartphones, wearables and a multitude of devices in the home. With the introduction …

The risks of moving data into cloud and mobile environments

In this podcast recorded at RSA Conference 2015, Rich Campagna, VP, Products & Marketing at Bitglass, talks about how cloud and mobile and the the largest trends …

Yahoo develops cheap, effective biometric smartphone authentication

A group of Yahoo researchers have demonstrated that apart from fingerprints, other parts of the human body, such as ears, fists, palms and fingers, can also be successfully …

escalator
Simplified VPN, web access for authorized users via push notification

Entrust Datacard announced at RSA Conference 2015 the introduction of a new push authentication capability in its Entrust IdentityGuard Mobile platform that allows authorized …

Mobile malware is like Ebola – an overhyped threat

“Today, at RSA Conference 2015 in San Francisco, Damballa unveiled research which details the overblown nature of the mobile malware problem. Damballa monitos nearly 50% …

Apple Watch
Apple Watch app for managing threat intelligence on-the-go

ThreatStream today announced at RSA Conference 2015 the first iOS threat intelligence app for the Apple Watch. The app, which is also available for the iPhone and iPad, …

Key trends for risk-prone behavior in the workforce

Businesses are ill prepared for the high-risk, high-growth mindset of the GenMobile workforce, creating alarming disparity around security practices in the corporate world. …

The need for end-user visibility in a Bring Your Own Anything environment

Mobiles, tablets, PCs, applications, cloud services – employees are increasingly bringing non-company devices into their organizations and connecting them to everything …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools