mobile devices
A decade of vulnerabilities and predictions for 2012
Since 2001, Spanish security firm S21sec has been been compiling a database of vulnerabilities detected by themselves and those reported by a great number of sources which …
BYOD security for cloud Wi-Fi access
AirTight Networks introduced device fingerprinting techniques in its SpectraGuard Enterprise WIPS and AirTight Cloud Services that provide BYOD security and detection, …
Data protection risks on mobile devices
An increasing number of professionals (80 percent) work remotely and rely on personal devices such as smartphones (63 percent), iPads (30 percent) and laptops (80 percent) to …
CIO concerns over mobile data security
UK CIOs and IT managers are increasingly concerned about data protection on mobile devices, according to Sophos. Three quarters of those surveyed have had to deal with lost or …
Voltage Security unveils Mobile Plus initiative
Voltage Security announced Voltage Security Mobile Plus, an initiative to extend its existing mobile security solutions to protect the new generation of mobile devices, …
Identity, app and mobile device monitoring
Lancope unveiled the latest version of its StealthWatch System, which harnesses the power of NetFlow and other flow data from existing infrastructure to cost-effectively …
Turning mobile devices into enterprise credentials
Entrust is extending its Entrust IdentityGuard strong authentication platform to offer smart credentials on mobile devices for enterprise-grade security. Taking advantage of …
Employees are deliberately disabling security controls
Corporate mobile devices and the bring-your-own-device (BYOD) phenomenon are rapidly circumventing enterprise security and policies, say the results of a new global study …
EMC unveils five new security advisory services
Virtualization, cloud computing, mobile technologies, and the emergence of a new class of Big Data applications have dramatically altered how organizations create, deliver, …
CSA launches mobile and innovation initiatives
The Cloud Security Alliance announced two significant new initiatives for 2012, addressing growing areas of need in cloud security – mobile computing and innovation. …
Design guidelines for mobile app privacy
The GSM Association (GSMA), with the support of mobile operators in Europe and following consultation across the wider mobile ecosystem, has published a set of global Privacy …
Tips to minimize the risk of identity fraud
Javelin Strategy & Research recommends that consumers follow a three-step approach to minimize their risk and impact of identity fraud. Prevention 1. Keep personal data …
Featured news
Resources
Don't miss
- Browser-in-the-Browser phishing is on the rise: Here’s how to spot it
- Enterprise security faces a three-front war: cybercrime, AI misuse, and supply chains
- Rakuten Viber CISO/CTO on balancing encryption, abuse prevention, and platform resilience
- Turning cyber metrics into decisions leaders can act on
- Teaching cybersecurity by letting students break things