Read more about mobile devices
Bookmark and Share
  • Organizations lack control over mobile workspaces

    14.05.2015

    More than 64 percent of respondents to a SANS survey said a majority of their mobile workforce can access their organizations’ secure data remotely, yet less than 25 percent said sufficient policies/controls are in place for mobile media.

  • Total data protection outside the firewall

    13.05.2015

    Gartner called Cloud Access Security Brokers (CASBs) the number one technology for information security in 2014.

  • IoT and the great data heist

    11.05.2015

    The term mobile has evolved from the device that simply made and received phone calls, to smartphones, wearables and a multitude of devices in the home.

  • The risks of moving data into cloud and mobile environments

    05.05.2015

    In this podcast recorded at RSA Conference 2015, Rich Campagna, VP, Products & Marketing at Bitglass, talks about how cloud and mobile and the the largest trends happening in enterprise IT today.

  • Yahoo develops cheap, effective biometric smartphone authentication

    30.04.2015

    A group of Yahoo researchers have demonstrated that apart from fingerprints, other parts of the human body, such as ears, fists, palms and fingers, can also be successfully used to authenticate users to their mobile phones.




Spotlight

Hospitals advised to stop using vulnerable computerized drug pumps

This is the first time that the US FDA has advised healthcare providers to stop using a medical device because of cybersecurity vulnerabilities.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  
DON'T
MISS

Tue, Aug 4th
    COPYRIGHT 1998-2015 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //