mobile devices
Legitimate Chinese app stores riddled with security holes
If you are an Android user, you are surely aware of the fact that Chinese third-party app stores are where most malware for that particular OS has its debut. Lacking any kind …
The next step in BYOD security
The explosion in development and adoption of smartphones and tablets for both personal and business use in the past two years is both a blessing and a curse to IT departments …
Mobile app protection to iPhone and iPad
Mocana introduced its latest version of MAP, which brings security to iOS apps. MAP 2.0 simplifies, automates and secures mobile app management for enterprise IT and the …
Mobile devices expose company data to vulnerabilities
Mobilisafe announced results of its SMB focused study. As part of a private beta program, participants evaluated a product that assesses the security risk of mobile devices …
SecureZIP Reader for iOS released
PKWARE announced SecureZIP Reader for iOS, an application that secures enterprise and government data on phones and tablets. The SecureZIP solution secures corporate …
Five steps to enhance mobile device security
Mobile devices are quickly becoming a target rich and high return on investment environment for malicious attackers. Their use is expected to surpass the use of existing …
CipherUSB: Encryption for Flash, USB or optical drives
Addonics announced CipherUSB, a USB pass-through adapter that provides a way to encrypt data stored on flash drives, flash media, USB hard drives as well as Blu-ray, DVD or CD …
How to do BYOD the right way
The massive proliferation of mobile devices and the employees’ tendency to prefer using devices they chose themselves has created quite a conundrum and challenges for …
Sophos acquires DIALOGS to provide mobile device protection
Sophos has entered into a definitive agreement to acquire DIALOGS, a privately-held provider of mobile management solutions, headquartered in Germany. DIALOGS, a mobile device …
Top concern? Mobile device vulnerability management
Mobile device vulnerability management is a top concern for security professionals for the next 12 to 15 months, according to Tenable Network Security. According to the study, …
The dangers of uncoordinated backup practices
One-third of SMBs allow employees to select their own method of backup for their data at work – essentially passing the buck when it comes to data protection, according …
Data collection with mobile devices
Fulcrum Biometrics At-Scene announced that the iBolo law enforcement mobile application is now integrated with the FbF mobileOne biometric fingerprint accessory to allow field …
Featured news
Resources
Don't miss
- Qantas data breach could affect 6 million customers
- Cybersecurity essentials for the future: From hype to what works
- How FinTechs are turning GRC into a strategic enabler
- Secretless Broker: Open-source tool connects apps securely without passwords or keys
- Product showcase: Protect your data with Apricorn Aegis Secure Key 3NXC