Unisys Stealth for Mobile solution protects against BYOD issues
Unisys announced the Unisys Stealth for Mobile solution to address the security concerns facing enterprises as growing numbers of their employees use consumer devices at work. …
How to establish trust in the cloud
Business is increasingly taking place outside the corporate firewall. Employees are using their own devices and turning to consumer-grade cloud file sharing services to allow …
BYOD vulnerability remediation from iScan Online
iScan Online announced a new user-friendly approach that will prioritize and simplify how users remediate their own devices. The new BYOD remediation feature categorizes …
Are workers drowning in a sea of ineffective technology?
With the rise of mobile, the cloud and multiple device use, today’s workers are more connected than ever before, giving them access to high-volume streams of information …
Watchful Software updates its information protection solution
Watchful Software released RightsWATCH 5.0, which extends the secure flow of information throughout an organization while automatically applying corporate security policies …
Acronis advances secure BYOD with mobilEcho
Acronis launched mobilEcho 4.5, a mobile file management (MFM) solution that now includes in-app editing tools for Microsoft Office documents and military-grade, certified …
The legal implications of BYOD
The legality of the common practice of remotely wiping or tracking an employee’s mobile device while asking workers to sign waivers giving their consent for such a …
Appthority unveils app risk and policy management solution
Appthority announced an all-in-one app risk management solution combining app reputation analysis with a new policy management functionality, enabling organizations to create …
Email data protection through a mobile app
ZixCorp announced commercial availability of ZixOne, a mobile email app that solves the key IT challenge created by the BYOD trend. ZixOne manages access to corporate email …
Identify unknown internal email-enabled systems
Sendmail today introduced Sentrion Rogue Email Application Control (REAC) 2.0, the first inside-threat protection application with new Big Data search capabilities to further …
Adoption of antivirus software on mobile devices remains low
Consumer adoption and willingness to pay for antivirus software on mobile devices is low, according to Gartner. Gartner believes that high consumer use of personal mobile …
Enterprises in denial regarding network security
Many enterprises possess an unrealistic confidence surrounding the security of their networks. According to a Lancope survey, more than 65 percent of IT/security professionals …
Featured news
Resources
Don't miss
- September 2025 Patch Tuesday forecast: The CVE matrix
- Google fixes actively exploited Android vulnerabilities (CVE-2025-48543, CVE-2025-38352)
- CyberFlex: Flexible Pen testing as a Service with EASM
- LinkedIn expands company verification, mandates workplace checks for certain roles
- macOS vulnerability allowed Keychain and iOS app decryption without a password