Please turn on your JavaScript for this page to function normally.
IoT and the great data heist

The term mobile has evolved from the device that simply made and received phone calls, to smartphones, wearables and a multitude of devices in the home. With the introduction …

The risks of moving data into cloud and mobile environments

In this podcast recorded at RSA Conference 2015, Rich Campagna, VP, Products & Marketing at Bitglass, talks about how cloud and mobile and the the largest trends …

Yahoo develops cheap, effective biometric smartphone authentication

A group of Yahoo researchers have demonstrated that apart from fingerprints, other parts of the human body, such as ears, fists, palms and fingers, can also be successfully …

escalator
Simplified VPN, web access for authorized users via push notification

Entrust Datacard announced at RSA Conference 2015 the introduction of a new push authentication capability in its Entrust IdentityGuard Mobile platform that allows authorized …

Mobile malware is like Ebola – an overhyped threat

“Today, at RSA Conference 2015 in San Francisco, Damballa unveiled research which details the overblown nature of the mobile malware problem. Damballa monitos nearly 50% …

Apple Watch
Apple Watch app for managing threat intelligence on-the-go

ThreatStream today announced at RSA Conference 2015 the first iOS threat intelligence app for the Apple Watch. The app, which is also available for the iPhone and iPad, …

Key trends for risk-prone behavior in the workforce

Businesses are ill prepared for the high-risk, high-growth mindset of the GenMobile workforce, creating alarming disparity around security practices in the corporate world. …

The need for end-user visibility in a Bring Your Own Anything environment

Mobiles, tablets, PCs, applications, cloud services – employees are increasingly bringing non-company devices into their organizations and connecting them to everything …

Snapchat blocks third-party apps from accessing its APIs

Snapchat has had its fair share of data breaches and security troubles, the latest of which stemmed from the fact that the app’s internal API has been reverse-engineered …

Behavioral biometrics: The password you can’t forget

This year’s Mobile World Congress featured more biometrics technology than ever before, with the launch of Google’s Android Pay and Samsung Pay both unveiling …

Mobile apps are not being tested for insecure behavior

Enterprises are not doing nearly enough to understand which mobile app behaviors hitting their networks and data are risky, nor are they testing apps for those risky behaviors …

UK consumers committed to mobile privacy

Spurred by high-profile data breaches, Edward Snowden’s revelations, and by the growing awareness that their smartphones hold a lot of sensitive data, most UK users have …

Don't miss

Cybersecurity news