Securing mobile apps in the enterprise
The mobile app has become the endpoint. With the advent of consumerization and BYOD, the number of managed devices began shrinking and that of unmanaged devices continues to …
Biggest enterprise data recovery myths
Kroll Ontrack announced the top five data recovery myths. From concerns over cost, system complexity and data protection to resource constraints and simple misunderstandings, …
Three BYOD problems that need to be solved
The Bring Your Own Device (BYOD) phenomenon has long stopped being just a fad and the option has become a crucial part of keeping employees and contractors happy and …
CompTIA Security+ SY0-301 Authorized Practice Questions Exam Cram (3rd Edition)
The title says it all - with over 800 practice questions, this book covers all the topics addressed in the CompTIA Security+ SY0-301 exam, and the CD allows you to experience …
Switching to the Mac: The Missing Manual, Lion Edition
There’s never been a better time to switch to Mac OS X and David Pogue’s newly released Switching to the Mac: The Missing Manual, Lion Edition can help you do it. …
Behind the scenes of the cleanest ISP in the world
The malware and botnet problem has been around for quite a while, and definitive solutions for it are still eluding the Internet and mobile communication industry, as well as …
SSL/TLS deployment best practices
SSL/TLS is a deceptively simple technology. It is easy to deploy, and it just works-¦ except that it does not, really. The first part is true – SSL is easy to deploy …
The next step in BYOD security
The explosion in development and adoption of smartphones and tablets for both personal and business use in the past two years is both a blessing and a curse to IT departments …
Tips for combating online risks
To help consumers understand online risks and practice safe behaviors, Webroot security experts recommend the following: Phone home safely – Mobile malware is on the …
Five steps to enhance mobile device security
Mobile devices are quickly becoming a target rich and high return on investment environment for malicious attackers. Their use is expected to surpass the use of existing …
How Google Tests Software
Testing expert James Whittaker, a former Google testing leader, and two top Google experts reveal exactly how Google tests software, offering best practices you can use. How …
User activity monitoring crucial to minimizing security risks
In this ever evolving threat landscape, willing or unwitting insiders often play a key role in security compromises of organizations. It used to be that an …
Featured news
Resources
Don't miss
- Fake macOS help sites push Shamos infostealer via ClickFix technique
- Why a new AI tool could change how we test insider threat defenses
- Why satellite cybersecurity threats matter to everyone
- Kopia: Open-source encrypted backup tool for Windows, macOS, Linux
- Review: Adversarial AI Attacks, Mitigations, and Defense Strategies