Please turn on your JavaScript for this page to function normally.
Top concern? Mobile device vulnerability management

Mobile device vulnerability management is a top concern for security professionals for the next 12 to 15 months, according to Tenable Network Security. According to the study, …

The dangers of uncoordinated backup practices

One-third of SMBs allow employees to select their own method of backup for their data at work – essentially passing the buck when it comes to data protection, according …

Data collection with mobile devices

Fulcrum Biometrics At-Scene announced that the iBolo law enforcement mobile application is now integrated with the FbF mobileOne biometric fingerprint accessory to allow field …

Next Level Security Systems releases mobile apps

Next Level Security Systems released the NLSS Gateway 2.3, a new version of the NLSS Gateway that includes the power of a customized management tool, and NextMobile, a mobile …

Top U.S. cities for phone loss

The findings from a phone loss study revealed that lost phones, if unrecovered, could cost U.S. consumers more than $30 billion this year. The analysis, from more than 15 …

Smartphone security checklist

While smartphones can make a significant and positive impact on those who embrace the technology, conversely the technology can wreak havoc on its users if they are …

Confidential documents are leaving the workplace

90% of Americans believe people remove confidential documents from the workplace, even though most adults (79%) say taking confidential files outside the office is grounds for …

Cisco goes beyond BYOD

Employees are demanding not only to use their own devices at work, but also to have more flexibility in the way they work and when and where they work. The Cisco Connected …

Unified web security solution from Blue Coat

Blue Coat Systems introduced its Unified Security solution that enables the extended enterprise to expand its secure perimeter to now include all users on devices across any …

Fake Google Play site serves Android malware

Online scammers are known for their adaptability, so it should not come as a surprise that the recent name change of Google’s official Android Market – now dubbed …

A decade of vulnerabilities and predictions for 2012

Since 2001, Spanish security firm S21sec has been been compiling a database of vulnerabilities detected by themselves and those reported by a great number of sources which …

BYOD security for cloud Wi-Fi access

AirTight Networks introduced device fingerprinting techniques in its SpectraGuard Enterprise WIPS and AirTight Cloud Services that provide BYOD security and detection, …

Don't miss

Cybersecurity news