Read more about mobile devices
Bookmark and Share
  • How organizations deal with BYOD and mobile security

    24.07.2014

    A new study found that nearly half of respondents agreed that users bringing downloaded apps or content with embedded security exploits into their organization, as well as malware infections, are top BYOD security concerns.

  • Exploring the BYOD security dynamic

    11.07.2014

    Webroot examined the use and security of personal mobile devices in the work environment from both the employee and employer perspectives.

  • Risks of selling used smartphones

    08.07.2014

    AVAST Software easily retrieved personal data from used smartphones sold online, despite consumers deleting their data.

  • Mobile banking users to exceed 1.75 billion by 2019

    08.07.2014

    Over 1.75 billion mobile phone users will have used their devices for banking purposes by the end of 2019, compared to 800 million this year, according to Juniper Research.

  • Exploring the mobile security landscape

    07.07.2014

    In this interview, Adam Ely, COO of Bluebox, discusses the most significant mobile security challenges for enterprise security professionals, illustrates how BYOD is shaping the enterprise mobile security landscape, and offers advice for CISOs trying to protect data confidentiality and integrity while working with an increasingly mobile workforce.




Spotlight

Why IT security is broken and how math can save it

Posted on article.php?id=2107  |  Stuart McClure, CEO at Cylance, talks about how the information security industry has evolved when it comes to detecting bad guys, but it's being mostly reactive and not proactive.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Wed, Aug 27th
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //