Read more about mobile devices
Bookmark and Share
  • How organizations deal with BYOD and mobile security

    24.07.2014

    A new study found that nearly half of respondents agreed that users bringing downloaded apps or content with embedded security exploits into their organization, as well as malware infections, are top BYOD security concerns.

  • Exploring the BYOD security dynamic

    11.07.2014

    Webroot examined the use and security of personal mobile devices in the work environment from both the employee and employer perspectives.

  • Risks of selling used smartphones

    08.07.2014

    AVAST Software easily retrieved personal data from used smartphones sold online, despite consumers deleting their data.

  • Mobile banking users to exceed 1.75 billion by 2019

    08.07.2014

    Over 1.75 billion mobile phone users will have used their devices for banking purposes by the end of 2019, compared to 800 million this year, according to Juniper Research.

  • Exploring the mobile security landscape

    07.07.2014

    In this interview, Adam Ely, COO of Bluebox, discusses the most significant mobile security challenges for enterprise security professionals, illustrates how BYOD is shaping the enterprise mobile security landscape, and offers advice for CISOs trying to protect data confidentiality and integrity while working with an increasingly mobile workforce.




Spotlight

Patching: The least understood line of defense

Posted on 29 August 2014.  |  How many end users, indeed how many IT pros, truly get patching? Sure, many of us see Windows install updates when we shut down our PC and think all is well. Itís not.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Tue, Sep 2nd
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //