Please turn on your JavaScript for this page to function normally.
Secure corporate BYOD solution by ForeScout

ForeScout Technologies announced interoperability between ForeScout CounterACT network security and SAP Afaria mobile device management (MDM) platforms. The combination …

Characteristics of effective security leaders

A new IBM study of security leaders reveals that they are increasingly being called upon to address board-level security concerns and as a result are becoming a more strategic …

Traditional security models becoming exhausted

The Nexus of Forces is transforming the approach towards information security as new requirements are brought about by social, mobile, cloud and information. Gartner predicts …

Cyber attacks targeting the energy sector on the rise

Alert Logic examined the rise of cyber attacks targeting the energy sector—an industry thought to be particularly at risk due to the highly confidential and proprietary …

Young employees don’t care about corporate policies

There’s a growing appetite of Generation Y employees to contravene corporate policies governing use of own devices, personal cloud storage accounts and new technologies …

Mobile IDS/IPS solution for iOS devices

Skycure introduced its mobile IDS/IPS solution that protects iPhones and iPads by monitoring network traffic behavior and remediating suspicious activity. Existing solutions …

Webroot enhances mobile threat protection

Webroot released a new edition of Webroot SecureAnywhere Business – Mobile Protection to ensure mobile devices and company data stay secure. As more organizations face …

Unisys Stealth for Mobile solution protects against BYOD issues

Unisys announced the Unisys Stealth for Mobile solution to address the security concerns facing enterprises as growing numbers of their employees use consumer devices at work. …

How to establish trust in the cloud

Business is increasingly taking place outside the corporate firewall. Employees are using their own devices and turning to consumer-grade cloud file sharing services to allow …

BYOD vulnerability remediation from iScan Online

iScan Online announced a new user-friendly approach that will prioritize and simplify how users remediate their own devices. The new BYOD remediation feature categorizes …

Are workers drowning in a sea of ineffective technology?

With the rise of mobile, the cloud and multiple device use, today’s workers are more connected than ever before, giving them access to high-volume streams of information …

Watchful Software updates its information protection solution

Watchful Software released RightsWATCH 5.0, which extends the secure flow of information throughout an organization while automatically applying corporate security policies …

Don't miss

Cybersecurity news