Please turn on your JavaScript for this page to function normally.
Tenable Network Security updates vulnerability management solution

Tenable Network Security announced SecurityCenter Continuous View, a vulnerability management solution that provides real-time, continuous vulnerability, configuration, and …

BYOD increases costs for most organizations

The results of a study by Lieberman Software Corporation confirms that BYOD (bring your own device) increases costs to businesses. Respondents were asked if they believed …

BYOD is overtaking the workplace, security is top concern

Across the U.S. and Europe, the majority (78 percent) of enterprise IT decision makers say that employees are already using consumer devices to conduct company business, …

Beware of “Free Apple Product” SMS messages

Given the all-around popularity of various Apple devices, it’s no wonder scammers often “offer” them as prizes in bogus contests and lotteries. The latest of …

USB with AES 256-bit hardware encryption

Enova Technology announced the Enigma module, a USB encryption solution designed to provide real-time full disk encryption for any USB mass storage class (MSC) drive. Key …

Total Defense launches mobile security for business

Total Defense launched the Total Defense Mobile Security Suite, a cloud based solution that delivers a wide range of security and management features to reduce the risks …

Detect and shut down rogue mobile apps

To counter the emergence of malicious and unauthorized apps appearing on mobile app stores, RSA introduced the RSA FraudAction Anti Rogue App Service designed to detect and …

Broadcom introduces 5G WiFi combo chip for smartphones

Broadcom introduced the BCM4335, the first complete 5G WiFi combo chip for smartphones, tablets, ultrabooks and other mobile devices. 5G WiFi, the 5th generation of Wi-Fi …

Hidden security risks of top mobile apps

Appthority cast a spotlight on the hidden behaviors of the top free mobile apps. The report reveals the security issues raised by the BYOD movement, app market fragmentation …

67,000 phones to be lost or stolen during the Olympics

Numbers of smartphones and other portable networked devices have exploded over the past few years. As a result, this year’s Games will see the largest-ever risk of …

Detecting mobile device vulnerabilities using Nessus

This video by Paul Asadoorian shows you how to enable and use the Nessus plugins which identify mobile devices and vulnerabilities from your MDM (Mobile Device Management) servers.

Good Technology enhances enterprise mobility solutions

Good Technology announced the addition of Good Dynamics AppKinetics to its Good Dynamics platform, which helps protect enterprise data in transit, at rest, and in use on …

Don't miss

Cybersecurity news