Tag "BYOD"

Back to homepage
Hardware/Network

Why do we need a risk-based approach to authentication?

20 years ago, everyone worked at a desktop workstation hardwired into an office building. This made network security simple and organizations felt they could depend on the time-tested method of

Hardware/Network

5 Tips For Securing Your Network Printing

Your office printer might not appear to pose much of a security threat. But if left unprotected, it may in fact present a serious risk to your network and resources.For

Hardware/Network

Coprocessor Attacks: the Hidden Threat

Botnets, DDoS and ransomware attacks, vulnerabilities in Internet of Things devices and Open Source Software, and the generally poor state of information security, dominate the discussion of cybersecurity. These same

Hardware/Network

The network vulnerabilities hiding in plain sight

Any company wanting to redefine its network security strategies in the wake of substantial IoT growth should start with the following four steps.There is no denying that, for better or

Industry Insights

Cybersecurity tips that are cost-effective and efficient

Cybersecurity experts are in agreement: enterprises simply cannot afford to skip investing in protections that safeguard their networks, systems and data. But with budgets straining, even as attacks are more

Software

2018 Data Security Predictions

From the HBO cyber attack which leaked episodes of Game of Thrones, to the worldwide Wannacry attack which targeted different industries in a range of countries, cybercriminals are becoming more

Mobile Software

Mobile Malware Incidents Hit 100% of Businesses

Attempted malware infections against BYOD and corporate mobile devices are expected to continue to grow, new data shows.Every business with BYOD and corporate mobile device users across the globe has

BYOD/Big Data

The evolution of BYOD security in a mobile-first world

Bitglass’ research team surveyed 200 IT and security professionals at a national Gartner conference to learn more about the evolution of BYOD security in a mobile-first world. Click Here To

BYOD/Big Data

Quarter of Firms Allow Password-Only BYOD Security

Over a quarter (28%) of organizations rely solely on user-generated passwords to secure BYOD, potentially exposing countless endpoints to credential guessing, cracking and theft, according to Bitglass. Click Here To View

Mobile

Top blacklisted Android and iOS apps by enterprises

Enterprises blacklist apps for a range of security concerns, including specific malicious or data leakage behaviors, security policy compliance and concerns about shadow data storage. Appthority revealed the most frequently