Archive

Back to homepage
BYOD/Big Data

The five pillars of Network Access Control (NAC) needed to enforce BYOD – SC Magazine UK

In its latest Market Guide to Network Access Control (NAC), Gartner states that monitoring and enforcing BYOD is one of the primary drivers for organisations to invest in NAC. As

Mobile

Mobile Security Moves On Up – Post – No Jitter

You may have noticed that there hasn’t been too much talk about mobile security vulnerabilities over the past few years. This is largely due to significant developments that have been

Vendor News

OptioLabs Awarded Patent for Innovative Mobile Security Technology | Business Wire

OptioLabs, a developer of security insight solutions for the mobile enterprise, today announced it was granted US Patent US9363670 for restricting access to network resources via in-location access point protocol.

Mobile

Mobility money: Which areas of mobile security bring big bucks for the channel? | Channelnomics

It’s no secret that we’re living in an increasingly mobile world. Plus, with the proliferation of devices and employees taking sensitive corporate data on the move through use of BYOD,

Industry Insights

Recalibrating Cybersecurity Spending Projections

Cybersecurity Ventures estimates that spending on cybersecurity products and services will reach over $1 trillion during the five-year period from 2017 to 2021. Click here to view original web page

Industry Insights

Most cyber security strategies ignore the way attackers really work

Cyber attackers use more legitimate software than malware, which means most organisations are incapable of detecting much of the malicious activity in their networks, a report reveals Click here to

Industry Insights

Policymakers Not Focused Enough on Grid Cybersecurity, Think Tank Says – CIO Journal. – WSJ

Policymakers aren’t focused enough on cybersecurity threats facing the country’s electric grids as more of the infrastructure becomes connected to the internet, a think tank said Wednesday. Click here to

Industry Insights Uncategorized

CISO challenges: Addressing cybersecurity blind spots

Every enterprise has cybersecurity blind spots that it fails to recognize and address. Sean Martin explains what they are and how they create more CISO challenges. Click here to view

Identity Theft

Almost 25% of consumers report financial data breaches

In just the past two years, nearly one fourth of consumers reported that their financial data had been hacked online in the past two years, according to a new report

Software

Passwords often a ‘weak point’ for consumers in cyber security – Daily Courier: National Business

This month, the University of Calgary paid $20,000 to regain access to its email system after a so-called ransomware cyber-attack. A year ago, Ashley Madison, a website that facilitates extra-marital