Please turn on your JavaScript for this page to function normally.
Secure smart devices for the holiday season

Summer is almost here and many are currently considering taking their beloved smart devices with them on their travels. However, the risks of doing so are sizeable.With a …

Organizations lack control over mobile workspaces

More than 64 percent of respondents to a SANS survey said a majority of their mobile workforce can access their organizations’ secure data remotely, yet less than 25 percent …

Fire
Total data protection outside the firewall

Gartner called Cloud Access Security Brokers (CASBs) the number one technology for information security in 2014. In fact, by 2016, 25% of enterprises will secure access to …

IoT and the great data heist

The term mobile has evolved from the device that simply made and received phone calls, to smartphones, wearables and a multitude of devices in the home. With the introduction …

The risks of moving data into cloud and mobile environments

In this podcast recorded at RSA Conference 2015, Rich Campagna, VP, Products & Marketing at Bitglass, talks about how cloud and mobile and the the largest trends …

Yahoo develops cheap, effective biometric smartphone authentication

A group of Yahoo researchers have demonstrated that apart from fingerprints, other parts of the human body, such as ears, fists, palms and fingers, can also be successfully …

escalator
Simplified VPN, web access for authorized users via push notification

Entrust Datacard announced at RSA Conference 2015 the introduction of a new push authentication capability in its Entrust IdentityGuard Mobile platform that allows authorized …

Mobile malware is like Ebola – an overhyped threat

“Today, at RSA Conference 2015 in San Francisco, Damballa unveiled research which details the overblown nature of the mobile malware problem. Damballa monitos nearly 50% …

Apple Watch
Apple Watch app for managing threat intelligence on-the-go

ThreatStream today announced at RSA Conference 2015 the first iOS threat intelligence app for the Apple Watch. The app, which is also available for the iPhone and iPad, …

Key trends for risk-prone behavior in the workforce

Businesses are ill prepared for the high-risk, high-growth mindset of the GenMobile workforce, creating alarming disparity around security practices in the corporate world. …

The need for end-user visibility in a Bring Your Own Anything environment

Mobiles, tablets, PCs, applications, cloud services – employees are increasingly bringing non-company devices into their organizations and connecting them to everything …

Snapchat blocks third-party apps from accessing its APIs

Snapchat has had its fair share of data breaches and security troubles, the latest of which stemmed from the fact that the app’s internal API has been reverse-engineered …

Don't miss

Cybersecurity news