mobile devices
Is accessing work apps on the move destructive?
There’s a lack of mobile working policies can lead to destructive consequences for businesses, according to Ping Identity. On a regular basis, 44% of employees access up …
In-house control and encrypted voice calls
Cellcrypt announced Cellcrypt Private Switch, a private network that allows an organization’s administrators complete privacy over user identity and calling activity. …
Assess and score mobile application and device risks
Agiliance unveiled the new Agiliance Mobile Trust Service, an extension of the company’s Agiliance RiskVision platform, enables organizations to address mobile and BYOD …
IT consumerization still a threat
Despite the growing consumerisation of IT, the majority (63 per cent) of employees in the UK say that corporate IT is failing to secure all personal devices brought into the …
Mobile application reputation service from Veracode
Veracode is expanding upon its enterprise application security services to include mobile application intelligence. The introduction of Mobile Application Reputation Service …
Most businesses experienced a mobile security incident
79% of businesses had a mobile security incident in the past year, in many cases incurring substantial costs, according to Check Point. The report found mobile security …
Managed services for web, cloud and mobile app security
Cenzic has expanded its Cenzic Managed Services for Enterprise Application Security which now includes four levels of service including a special compliance-ready assessment …
Employees continue to use risky apps on mobile devices
Risky applications and business applications are being used side-by-side on devices owned by employees that are used for work, according to a survey by the SANS Institute. …
Parents should be concerned about app security
Veracode released an infographic outlining the importance of mobile application security for children. It provides parents with tips for protecting their children, their …
Addonics releases CipherUSB family of hardware encryption solutions
Addonics Technologies announced a family of USB hardware encryption solutions that protect data stored on hard drives, removable drives, flash media, optical media or in the …
Can mobile malware be activated via sensors?
Can mobile malware be activated via sensors available on current mobile devices, and receive commands through out-of-band communication methods? If you ask a group of …
Fighting cybercrime is on the right track
Despite the numerous security incidents that took place during the first quarter of the year, the fight against cyber-crime is on the right track, according to PandaLabs. …